Information Security Governance Simplified From the Boardroom to the Keyboard
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to buil...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Electronic Book Chapter |
Language: | English |
Published: |
Taylor & Francis
2011
|
Subjects: | |
Online Access: | OAPEN Library: download the publication OAPEN Library: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | oapen_2024_20_500_12657_41772 | ||
005 | 20200723 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20200723s2011 xx |||||o ||| 0|eng d | ||
020 | |a b11357 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.1201/b11357 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a KCC |2 bicssc | |
072 | 7 | |a UB |2 bicssc | |
072 | 7 | |a UR |2 bicssc | |
100 | 1 | |a Fitzgerald, Todd |4 auth | |
700 | 1 | |a Fitzgerald, Todd |4 auth | |
700 | 1 | |a Peltier, Tom |4 auth | |
245 | 1 | 0 | |a Information Security Governance Simplified |b From the Boardroom to the Keyboard |
260 | |b Taylor & Francis |c 2011 | ||
300 | |a 1 electronic resource (433 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by-nc-nd/4.0/ |2 cc |4 https://creativecommons.org/licenses/by-nc-nd/4.0/ | ||
546 | |a English | ||
650 | 7 | |a Microeconomics |2 bicssc | |
650 | 7 | |a Information technology: general issues |2 bicssc | |
650 | 7 | |a Computer security |2 bicssc | |
653 | |a IT Security | ||
653 | |a Management of IT | ||
653 | |a Security Services | ||
653 | |a BUSINESS/MANAGEMENT | ||
653 | |a InfoSECURITY | ||
653 | |a SCI-TECH | ||
653 | |a ITECH | ||
653 | |a INFORMATIONSCIENCE | ||
653 | |a STM | ||
653 | |a card | ||
653 | |a controls | ||
653 | |a data | ||
653 | |a department | ||
653 | |a identity | ||
653 | |a industry | ||
653 | |a management | ||
653 | |a payment | ||
653 | |a program | ||
653 | |a system | ||
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/bitstream/id/3aca703e-7f5a-4be3-8668-ebf5a5529d56/9781439811634.pdf |7 0 |z OAPEN Library: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://library.oapen.org/handle/20.500.12657/41772 |7 0 |z OAPEN Library: description of the publication |